Not a good day to be an overexcited enthusiastic sales rep at Dragos, the cybersecurity provider. Over on LinkedIn (naturally), a slightly over-enthusiastic Dragos rep named Rob West made the batshit bold claim that Dragos could prevent cybersecurity hacks and extortion “from ever happening” in the first place. In fact, he said it twice, just in case no one believed him the first time. Which was probably a good idea.
In a post by another cybersecurity bro, Josh O’Sullivan of Ardalyst linked to a story about how the Marinette Marine shipyard, which makes vessels for the US Navy, had been hacked. O’Sullivan claimed — with a straight face — that CMMC would have prevented this from happening.
Umm, no. But that will become clearly evident around 2026, as we watch all those CMMC-certified companies posting about their own ransom incidents.
Not to be undone, West — whose LinkedIn profile says he’s Dragos’ Senior Enterprise Account Manager for US Navy / US Marine Corps Sales — offered up another snake oil cure solution.
Because you don’t reach the position of Senior Enterprise Account Manager for US Navy / US Marine Corps Sales without spamming your products in the comments sections at LinkedIn, West then repeated himself:
West couldn’t even be bothered to read the article he was linking to, because if he had, he would have realized that Josh O’Sullivan was just posting a story to sell his own cybersecurity consulting (for Ardalyst), and doesn’t work at Marinette Maritime. So Josh O’Sullivan couldn’t hire Dragos to fix the problem if he wanted to. But this sort of inability to read the room is on brand for desperate aggressive sales reps who stalk the comments sections of LinkedIn posts.
And, it has the added benefit of being hilarious to watch.
Then, for some reason, another cybersecurity consultant chimed in to shill for Dragos, too. Jaime Mizell of FCN IT, also sold Dragos as cancer cure the ultimate solution while giving West another chance to … well, do whatever the hell he thinks he’s doing:
All nice, except that the universe had other plans for Dragos, perhaps teaching a lesson that not only does pride goeth before a fall, and all that.
You see, just four days after West posted his stunningly daft bold claims, Dragos itself had been hit by a cybersecurity “incident” and a cyberextortion demand. Per the reporting from BleepingComputer:
While Dragos states that the threat actors did not breach its network or cybersecurity platform, they got access to the company’s SharePoint cloud service and contract management system.
After failing to breach the company’s internal network, they sent an extortion email to Dragos executives 11 hours into the attack.
While Dragos was quickly able to patch the problem, this flies in the face of West’s absolutely nutjob claims (yes, I stopped doing strikethrough jokes) that Dragos could “have prevented” cyberattacks and then keep them “from ever happening again.”
According to SC Media, the hack was the usual result of a single employee having been compromised, something that Dragos is unlikely to ever present a miracle cure for:
The incident began on Monday when an unnamed “known criminal group” gained access to select Dragos’ systems by compromising the personal email address of a new sales employee prior to their start date. The group then impersonated the new employee and completed initial steps in the company’s onboarding process. The activity was eventually flagged in an alert from their Security Information & Event Management, and the compromised account was blocked.
As far as I can tell, this is the first time Dragos was hacked, so it remains to be seen if they can literally “prevent this from ever happening again” but, clearly, logic and a functioning brain stem dictate that no single cybersecurity solution is as 100% foolproof as West claims. And now, if anything, their posturing paints a big, fat, red target on their backs, as hackers will flock to Dragos just to embarrass the living shit out of them.
We get it: cybersecurity is important, and the risks are high. But the industry is filled to the nose-hairs with shills, charlatans, and carnival barkers, all claiming their particular solution (CMMC! ISO 27001! Zero Trust!) is the thing that permanently fixes everything.
You know that’s not true. We all do.
Oh, and just wait until the CMMC players get hacked. Get out the popcorn for the comments sections on that day.
About Christopher Paris
Christopher Paris is the founder and VP Operations of Oxebridge. He has over 30 years' experience implementing ISO 9001 and AS9100 systems, and is a vocal advocate for the development and use of standards from the point of view of actual users. He is the author of Surviving ISO 9001 and Surviving AS9100. He reviews wines for the irreverent wine blog, Winepisser.